SecurityFocus

Results for SecurityFocus

by K. K. Mookhey, Nilesh Burghate
1. Introduction
In the last couple of years, attacks against the Web application layer have required increased attention from security professionals. This is because no matter how strong your ...

by Matthew Tanase
Introduction
As information technology professionals, we are constantly bombarded with new products and ideas claiming to be revolutionary. And for a brief amount of time, a few of these technologies seem to grab ...

by Dr. Neal Krawetz
Editor's note: part one of this article series is available here .
1. Overview
The Simple Mail Transfer Protocol was never designed for security. SMTP dates all the way back to a 1973 extension to ...

by Rohyt Belani, Michael Muckin
The popularity of web servers as a prime target for crackers and worm writers around the globe made IIS a natural place for Microsoft to focus its Trustworthy Computing Initiative. As a result, IIS has been ...

by Dr. Neal Krawetz
Editor's note: a French translation of this article, courtesy of Jerome Athias, is available here as a PDF document. Other requests for translation can be sent to the editors .
1. Overview
In a ...

by Jonathan Hassell
In the previous installment of this article, I discussed SUS, its purpose, and some of the workings on the server side, including how to push out the Automated Updates client. In this segment, you'll learn ...

by Laurent Oudot
401 Unauthorized
Authorization required.
Wireless technologies have spread quickly in recent years and are now widely deployed in corporate environments as well as at home. The human dependency on those technologies ...

by Jonathan Hassell
Patch management could easily be called the bane of every administrator's existence, the pain in the rear of system management, or that never ceasing headache that pounds at CIOs everywhere.
And I use the term ...

by Harry Anderson
1.0 Introduction
This article, the last in the series about Nessus, will endeavor to explain a Nessus report and how to analyze it. Nessus is a vulnerability scanner, a program that looks for security bugs in ...

by Tom Vogt
Since at least 1998 (see Avolio ), security experts have warned that a perimeter defence alone is insufficient, and the vast majority of networks are extremely vulnerable as soon as the firewall, proxy service or physical ...